Skip to content

Add cert-manager support#196

Open
Jakob-Naucke wants to merge 9 commits intotrusted-execution-clusters:mainfrom
Jakob-Naucke:kbs-cert
Open

Add cert-manager support#196
Jakob-Naucke wants to merge 9 commits intotrusted-execution-clusters:mainfrom
Jakob-Naucke:kbs-cert

Conversation

@Jakob-Naucke
Copy link
Contributor

cc @alicefr. Haven't written docs yet but you can get an idea of where it's going by looking at api/trusted-cluster-gen.go, test_utils::set_certificates.

Doesn't include verification for attestation key register. I used the same method as for register server, but I was under the impression the root certificate added in Ignition, which works for the merge from register server, isn't loaded at that time?

HTTP request failed: Put "https://attestation-key-register.test-bc1e06e7.svc.cluster.local:8001/register-ak": tls: failed to verify certificate: x509: certificate signed by unknown authority

Didn't bother too much because that flow is subject to updates.

Fixes: #2
(at which I took first looks when it was new, hence the longest commit timespan in a PR from me to date)

@openshift-ci
Copy link

openshift-ci bot commented Feb 13, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@openshift-ci
Copy link

openshift-ci bot commented Feb 13, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: Jakob-Naucke

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@alicefr
Copy link
Contributor

alicefr commented Feb 23, 2026

@Jakob-Naucke do I understand correctly that we have a single certificate for all the services?

@Jakob-Naucke
Copy link
Contributor Author

@alicefr no, see e.g. api/v1alpha1/crds.go

register-server falls back to a Kind-shaped AK registration URL when
none is provided. Keep Kind-isms out of redistributable operator code,
and drop the "enabled" toggle in the TEC CRD -- just rely on the
specified address when present. Do not assume a protocol (HTTP/HTTPS)
for it. Do not specify the endpoint (`/ak-register`), and thus do not
refer to a URL until it becomes one. Stop patching Ignition in tests.

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
@Jakob-Naucke
Copy link
Contributor Author

Moving out of draft, includes #207 for now

@Jakob-Naucke Jakob-Naucke marked this pull request as ready for review February 27, 2026 21:13
Warp is outsourcing multiple features with its move to Hyper v1 that
we used or were soon going to use:

- Client info like IP
- Native TLS support

These features are more broadly integrated in Axum, which kube-rs also
recently moved to.

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Assisted-by: Claude
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Assisted-by: Claude
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
In the trustedexecutioncluster CRD, add optional secret name for a
cert-manager shaped certificate. In testing, use cert-manager to
create a certificate.

Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Assisted-by: Claude
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
Assisted-by: Claude
Signed-off-by: Jakob Naucke <jnaucke@redhat.com>
@openshift-ci
Copy link

openshift-ci bot commented Feb 27, 2026

@Jakob-Naucke: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/operator-lifecycle-verify 9d5e964 link true /test operator-lifecycle-verify

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Create kbs certificates and private key

3 participants